1type rmt_storage, domain; 2type rmt_storage_exec, exec_type, vendor_file_type, file_type; 3 4init_daemon_domain(rmt_storage) 5 6wakelock_use(rmt_storage) 7 8r_dir_file(rmt_storage, sysfs_msm_subsys) 9 10set_prop(rmt_storage, ctl_vendor_rmt_storage_prop) 11 12allow rmt_storage self:capability { net_bind_service setgid setpcap setuid }; 13 14allow rmt_storage modem_block_device:blk_file rw_file_perms; 15allow rmt_storage uio_device:chr_file rw_file_perms; 16allow rmt_storage block_device:dir search; 17 18allow rmt_storage sysfs_uio:dir r_dir_perms; 19allow rmt_storage sysfs_uio:lnk_file r_file_perms; 20 21allow rmt_storage sysfs_rmtfs:dir search; 22allow rmt_storage sysfs_rmtfs:file r_file_perms; 23allow rmt_storage sysfs_rmtfs:dir search; 24 25allow rmt_storage self:socket create_socket_perms; 26allowxperm rmt_storage self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT; 27 28allow rmt_storage kmsg_device:chr_file w_file_perms; 29 30allow rmt_storage modem_fdr_file:dir rw_dir_perms; 31allow rmt_storage modem_fdr_file:file create_file_perms; 32 33dontaudit rmt_storage kernel:system module_request; 34